PHP 5.3.10 (Currently stable) Released, DoS & Remote Code Execution Vulnerability Patched
PHP developers announce the immediate availability of PHP 5.3.10. which closes remote code execution vulnerability. In their previous release a serious Denial of Service (DoS) Vulnerability was found later the team has release a security update of 5.3.9 which close that DoS vulnerability. To do so, the developers limited the maximum possible number of input parameters to 1,000 in php_variables.c using
max_input_vars
. Because of mistakes in the implementation, hackers can intentionally exceed this limit and inject and execute code. The bug is considered to be critical as code can be remotely injected over the web. The development version of PHP already has a patch for the bug, but the PHP developers have yet to issue an official advisory. It is not yet clear whether there are sensible immediate measures and workarounds for concerned.In this release developers are working to fix a critical security vulnerability in PHP that they introduced with a recent security patch. The current stable release is affected; however, it is not yet clear whether the questionable patch was also applied to older versions. PHP strongly encouraged all users to upgrade to PHP 5.3.10.
To Download PHP 5.3.10 Click Here
-Source (PHP & The-H)
LINK TO OUR HOME PAGE :


Categories:
download
,
security-news
,
vulnerablity